A UPnP-based Decentralized Service Discovery Improved Algorithm
|
|
- Eunice Alexander
- 5 years ago
- Views:
Transcription
1 Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi, Guo Run-niu Scool of Computer and Communication Lanzou University of Tecnology, Lanzou , Cina Troop 69050, Sawan , Cina Abstract Te current UPnP service discovery algoritm in te presence of te service can cause severe drops in te digital ome networ. Te reason is tat te root devices instantly send delay sending response messages and randomly selected independent response message congestion troug simulation analysis. To solve tese problems, an improved UPnP service discovery algoritm was given. Considering te lengt of te message and te bandwidt of te router, derived by testing te router te pacet loss rate can be reduced. Keywords: drop, service discovery, UPnP, queue size algoritm, best interval algoritm 1. Introduction Digital Home [1] networ refers to computer tecnology and networ tecnology as te foundation, all inds of ome appliances troug te different interconnection way communication and data excange, realize ouseold appliances between "te intercommunication", mae people never leave ome can be more convenient and quic access to information, tus greatly improve uman living comfort and entertaining. Home networs could consist of Information equipment, communications equipment, entertainment equipment, ome electric digital ome (Monitoring) device and electric ot water tables equipment, automation equipment, ligting equipment, security, ome alarm for elp equipment interconnection and management, as well as data and multimedia information saring. Te main purpose of te interconnection equipment sared networ services and resources, te remote call tem. Service discovery protocol [2] can effectively solve te device ow to automatically and effectively manage te problem of networed devices [3], a common coice UPnP service discovery algoritm [4]. However, wit te service in te digital ome networ gradually increased UPnP service discovery algoritms appear inefficient. Gribble [5] is trying to adopt a layered approac to solve te problem of Internet service discovery, tis approac, owever, ignores te "borderline" [6] of te ome networ environment. Cen Enyi et al [7] used in te UPnP root device (root devices) and te control point (control point) between a random delay is intermittently transmitted (RDCT) algoritms and sceduling delay instantaneous transmission (PDIT) algoritm, to some extent reduce te response to te news of te loss ratio, reducing te control point of te response message buffer size requirements. Asis T, et al [8] divide existing service discovery protocol into a "centralized" and "distributed", also acieved a certain effect on latency and networ traffic performance in service discovery. On tis basis, tis paper focuses on distributed small networ researc, using te improved algoritm of te size of te queue (Queue size Algoritm) and te best interval (Best interval Algoritm) algoritm to solve te service discovery message latency and pacet discard, in order to acieve a te service discovery smoot seamless connection. 2. Distributed Service Discovery Algoritm In te distributed service discovery model, te networ does not ave a directory server, te user and te service provider before broadcast communications. In tis researc, te application layer troug distributed computing to improve te rate of service discovery, te algoritm to be deployed in te active queue management (Active Queue Management, AQM), and te goal of te algoritm is: determine te router required transmission queue space and Received January 11, 2013; Revised Marc 3, 2013; Accepted Marc 18, 2013
2 22 ISSN: receive te next te outbrea of te news. Tis can be acieving by control te transmission rate of te service response. Te proposed algoritm includes instructions and interpreted message queue lengt required and two consecutive outbrea interval equation, in order to avoid tat te message will be discarded. OSI Open Systems Interconnection model, algoritm design at te application layer, protocol and application code, wic may cause te news, broe to te networ in terms of strategy. Te next rule requires eac computer routers send queue size or space, te router send queue and calculate te optimum interval must be available. Te algoritm was test in te case of distributed routers Queue Size Algoritm Te algoritm used to calculate te size of te sending queue for eac router, wic is illustrated in Pseudo code Algoritm 1. Te values m and n represent te number of clients and R services connected to Routers i respectively, were i 1, 2, Queue Size Algoritm. For i=1to No. of routers Start If(R i not connected to any node) SQsize Ri = Rim + Rin + 1. End 2.2. Best Interval Algoritm Assuming optionally te networ topology can be divided into rigt and left alves. In pseudo-code algoritm 2, equation to ensure best interval allows specific router receive te next burst message before forwarding all messages to te destination (client). Furter consider designated router queue sizes available, because it represents all te client (receiver) is connected to te router sared space between two or more continuous burst messages can be used to minimize te time required interval. Node z is number candidate routers. Message Size of service )) (1) Bandwidt tat message would use In Equation (1), te value of )) represents te maximum of ( Time ( x )). 1, 2,. j )) represents te lin time of message connection. Algoritm 2.pseudo code of interval algoritm Let te candidate routers C_R were =1,2 z. For = 1 to z Start Identify te two parts left and rigt of C_R. calculate te No. of services on left ( (Sl ) and on rigt( (SR (SR )). If(Lr > Rr ) else Large = Lr Large = Rr Calculate te best interval of CR : Large (BIC_R )= ))+ ))- )) (1) End for BI = 1 gaps Lr =1 =1 j For eac (BIC_R ) values = 1,2 z do te following: Start If ( BI < BIC_R ) End BI = BIC_R Rr =1 =1 gaps =1 )) : Represents te times of te number of message during te specific router does not receive messages from te nearest router. Wen tere is a service connected directly to te nearest router, it would require at least two message times to reac te router. IJEEI Vol. 1, No. 1, Marc 2013 : 21 26
3 IJEEI ISSN: Te following equations represent best interval for any router: Large gaps =1 =1 j (BIC_R )= ))+ ))- )) z. Te identified queue value by te routers can be used to minimize te BI value. Overlapped space (OS) value represents tis minimization. Pseudo code algoritm sows ow to calculate te OS. Pseudo code 3. calculation steps of OS Identy te router neigbor to cosen router and tis will be Rneigtbour. Let RLarge = Rneigbour. Let SQsize RLarge = sending queue size of RLarge Calculate OS = (SQsize - f(srlarge))/f(c ) (2) RLarge Ri n f(srlarge) = ( S ) represent te number of all services connected to 1 Rlarge. m f ( CRi) ( C ) represent all te number of client connect to Ri OS is measured from te 1 number of messages. It represents all te empty messages space in te sending queue of te cosen router. Equation (1)could use te OS value and be written as: Big gaps OS =1 =1 j =1 (BI) = T(x ) + T(x )-T(x )- T(x ) (3) And now te question is,all te routers in te networ must be evaluated in order to identify te best interval for te wole networ? Wic interval could be used for te networ? Te answer is: in a networ, not all routers must be evaluated, but part of te candidate as evaluation, te longest interval will eventually be used, because logic use te longest interval will be avoided in all oter routers on discarded news. Tere are some conditions can elp determine wic routers in deciding on te best value interval for maximum impact Te Rules of Coosing Candidate Router Te following rules indentify te bottlenecs of te messages flow pats. Tese rules required routers more time to forward te received messages during bursts: (1) Identify te longest pat between a client and service, and select te router wic is connected to tis client. (2) Identify te router wic connects te largest number to client and receives te largest number of services from anoter side of te networ. (3) Identify te router tat located nearest te end of te networ and is connected to one or more clients. If all te routers connected to a client, all te routers wic connect to te client must be selected in order to compare between two consecutive burst of messages tat reac tese routers consecutively. In te case of two (or more) consecutive bursts of te message is sent to te same client, and te client is separately connected to te router, wic means tat tere are two (or more) receiver logic connected to router, wic sould be in te calculation (OS) of te value wen considering. A client may meet more tan one of te previous conditions, in oter words, aving te longest pat and te client may be te same client, is connected to a router, wic receives te maximum number of services, it does not cause any problems. All candidate routers must be evaluated, te longest time interval is te best time interval in a networ, it can ensure tat no lost messages. A UPnP-based Decentralized Service Discovery Improved Algoritm (Yu Si-cai)
4 24 ISSN: Te Results Of Simulation Te application of simulation models clarify AQM on performing of UPnP. Tis was used to compare te algoritm, and under normal circumstances UPnP. Assume tat realistic application scenarios networ design includes four router (R0,R1,R2 and R3),in wic eac router connected to te tree services (S0, S1,..., and S9). Except R2 connected to six clients (C0, C1... C5).Te networ parameters are given in Table 1. (1) (C0,C1... C5) send multicast information on te networ to discover all services. (2) Te client sends a response message for all services requested. Algoritm, eac service separately any consecutive reply message witin a certain period of time. However, under normal circumstances, te service reply to te discovery request dependency. Tere are a UDP bacground traffic (S0, S8) and (S1 te S7), S0, S1 is connected to te R0, S7 and S8 connected to R3. Te bacwards flow rate is 0.01 and te message size is different. Routing rules based on te selected candidate, R2 is a candidate routers. Obviously, te service connect to R6 as te longest pat to reac te C0 and C1. Table 1. Networ Parameters Parameter name Value Bandwidt among routers (Main lins) 512Kb Bandwidt between routers and oter nodes (Sub lins) 256Kb Delay in main and sub 0ms Queue Type Drop Tail Routing Protocol DSDV Message Lengt of discovery(multicast) 64bytes Message Lengt of discovery reply(unicast) 128bytes Message Lengt of bac ward traffic 100,200,300bytes Simulation 100.0seconds R2 is: According to te size of te queue algoritm, te queue size for all te routers except SQsizeR0 41 5pacets,wile R2 21 3pacets In order to calculate te best interval, Overlapped Space(OS) must be calculated. OS (5 3) / messages spaces. All replying messages are different in te lin of bandwidt and equal in sizes: T x could be two values. ( ) 256*8 T( x ) 0.004s, 256*8 1 T( x ) 0.002s 512* *1024 Te Best Interval: ( BI) s. Te flowing Figure 1 and Figure 2 sow te networ utilization in algoritm and normal cases wen tis interval is applied in simulator. Growt enoug to receive burst in te next message is to forward all of te sudden news wen te news broe, te major part of te networ utilization is improved. Altoug te algoritm is to mae te calculation, in te case of using te algoritm to reac te upper limit of networ utilization will result in te loss of messages. Tis is because te algoritm does not tae into account te factors of te bacward message. IJEEI Vol. 1, No. 1, Marc 2013 : 21 26
5 IJEEI ISSN: Figure 1. Networ Utilization Comparison (Main Lin) Figure 2. Networ Utilization Comparison (Sub Lin) Te sub Lin results sow tat, under normal circumstances, tere are obvious differences, between normal case and using an algoritm, as is sown in Figure 2. Irrespective of active queue management in te utilization of te networ in te normal case to reac te upper limit and discard te message, wile in te case of using an algoritm, te networ utilization is less tan 85% and not discarded messages. Te previous figures sow tat te algoritm reduces discovery time by sending rate to avoid message loss. Tis ensures tat all messages to teir destination, witout loss of speed and efficiency. In addition, te figure also sows te impact of te bacward transport networ utilization and lost messages, tese must be considered in te algoritm to improve its performance. Figure 3 sows comparison AQM and under normal cases of te discovery rate. Overall, te service discovery algoritm uses a iger rate tan normal case. In te case of using an algoritm, te detection rate is between 77% -100%, and under normal cases, found 55% %. Figure 3. Discovery Rate Comparison 4. Conclusion During service discovery protocols, te router dropping messages results in incomplete discovery process, wic causes delay and inefficiency in connected nodes(s) performance. Tis algoritm solved tis problem. Tis algoritm introduces a new metod to te time interval required to determine te relationsip between te available spaces twice broe te news in te router queue. Tis indicates tat te specific metod to calculate te required transmit queue size. Tese metods can easily be modified to reduce te best interval by increasing te size of te queue and compete and vice versa. Tis algoritm tae te bandwidt of te networ A UPnP-based Decentralized Service Discovery Improved Algoritm (Yu Si-cai)
6 26 ISSN: configuration and size of te message in into consideration, tus affecting te rate of te transmission and reception. Previous experimental results sow tat te improved networ utilization discovery rate. In addition, tese Figures also sow tat te impact of te algoritm, te ratio of consumption of networ resources, wic indicates tat also need to provide te additional different parameters, te proposed algoritm available networ resources, in order to cope wit canging in te available networ. References [1] Yiaoumis Y, Huang T, Yap K, et al. Putting ome users in carge of teir networ. Systems and Infrastructure for te Digital Home, ACM Ubicomp worsop. 2012; 9: 1-6. [2] AlMejibli, Colley. Evaluating Transmission Time of Service Discovery Protocols by using NS2 Simulator. Wireless Advanced (WiAD). 2010; 11: [3] Intisar, Al-Mejibli, Martin, Colley. Enancing Service Discovery Performance over Home networs. Computer Networs & Communications (IJCNC). 2012; 4(2): [4] UPnP[EB/OL]. ttp://baie.baidu.com/view/27925.tm. [5] Gribble SD, Wels M, Beren RV, et al. Te Ninja arcitecture for robust Internet-scale systems and services. Computer Networs. 2001; 35(4): [6] Kind berg T, Fox A. System software for ubiquitous computing. Pervasive Computing. 2002; 1( 1): [7] Cen Enyi, SHI Yuancun, Xu Guang. UPnP service discovery algoritm performance analysis and improvement. Journal of Tsingua University. 2006; 46(4): [8] A sis T Bole, Sital Ranade. Approac of Association Rules Mining for Service Discovery in Mobile Adoc Networ. International Journal of Computer Applications. 2012; 44(8): IJEEI Vol. 1, No. 1, Marc 2013 : 21 26
ENHANCING SERVICE DISCOVERY PERFORMANCE OVER HOME NETWORKS
International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.2, March 22 ENHANCING SERVICE DISCOVERY PERFORMANCE OVER HOME NETWORKS Intisar Al-Mejibli and Martin Colley 2 Department of
More informationAn Algorithm for Loopless Deflection in Photonic Packet-Switched Networks
An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationBounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationOptimal In-Network Packet Aggregation Policy for Maximum Information Freshness
1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,
More informationReal-Time Wireless Routing for Industrial Internet of Things
Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer
More informationUtilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks
Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu
More informationGeorge Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of
IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,
More informationAn Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng
An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),
More informationDensity Estimation Over Data Stream
Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University
More informationNetwork Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks
Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More informationA Novel QC-LDPC Code with Flexible Construction and Low Error Floor
A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University
More informationSection 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More informationA Statistical Approach for Target Counting in Sensor-Based Surveillance Systems
Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,
More informationNetwork Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks
Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We
More informationIntra- and Inter-Session Network Coding in Wireless Networks
Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,
More informationTwo Modifications of Weight Calculation of the Non-Local Means Denoising Method
Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More informationHaar Transform CS 430 Denbigh Starkey
Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More information1.4 RATIONAL EXPRESSIONS
6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions
More informationInvestigating an automated method for the sensitivity analysis of functions
Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands
More informationDistributed and Optimal Rate Allocation in Application-Layer Multicast
Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More informationTraffic Sign Classification Using Ring Partitioned Method
Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,
More informationFast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation
P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,
More informationAuthor's personal copy
Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission
More informationSymmetric Tree Replication Protocol for Efficient Distributed Storage System*
ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University
More informationOn the Use of Radio Resource Tests in Wireless ad hoc Networks
Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos
More informationAn experimental framework to investigate context-aware schemes for content delivery
An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology
More informationNETWORKS UTILIZATION IMPROVEMENTS FOR SERVICE DISCOVERY PERFORMANCE
International Journal on Cloud Computing: Services and Architecture (IJCCSA),Vol., No.3, November 2 NETWORKS UTILIZATION IMPROVEMENTS FOR SERVICE DISCOVERY PERFORMANCE Intisar Al-Mejibli, Martin Colley
More information2.8 The derivative as a function
CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in
More informationMulti-Stack Boundary Labeling Problems
Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,
More informationTraffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks
Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University
More informationVector Processing Contours
Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of
More information13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR
13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f
More informationIntegrating Multimedia Applications in Hard Real-Time Systems
Integrating Multimedia Applications in Hard Real-Time Systems Luca Abeni and Giorgio Buttazzo Scuola Superiore S. Anna, Pisa luca@arti.sssup.it, giorgio@sssup.it Abstract Tis paper focuses on te problem
More informationLaser Radar based Vehicle Localization in GPS Signal Blocked Areas
International Journal of Computational Intelligence Systems, Vol. 4, No. 6 (December, 20), 00-09 Laser Radar based Veicle Localization in GPS Signal Bloced Areas Ming Yang Department of Automation, Sangai
More informationComputer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media
Computer Pysics Communications 183 (2012) 1890 1898 Contents lists available at SciVerse ScienceDirect Computer Pysics Communications ournal omepage: www.elsevier.com/locate/cpc Multi-GPU acceleration
More informationSoft sensor modelling by time difference, recursive partial least squares and adaptive model updating
Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou
More informationAnnouncements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher!
Announcements 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Lecture 11 CS2110 Fall 2017 is a program wit a teac anyting, learn
More informationREVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE
International Researc Journal of Engineering and Tecnology (IRJET) e-issn: 2395-0056 REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE Devendra Kumar 1, Dr. Krisna Raj 2 (Professor in ECE Department
More informationParallel Simulation of Equation-Based Models on CUDA-Enabled GPUs
Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian
More informationObstacle Avoiding Real-Time Trajectory Generation and Control of Omnidirectional Vehicles
2009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 10-12, 2009 FrC10.6 Obstacle Avoiding Real-Time Trajectory Generation and Control of Omnidirectional Veicles Ji-wung Coi,
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More informationMulti-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art
Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,
More informationAn Anchor Chain Scheme for IP Mobility Management
An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.
More informationMAC-CPTM Situations Project
raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Researc in Computer Science and Software Engineering Researc Paper Available online at: www.ijarcsse.com Performance
More informationAn Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks
An Evaluation of Alternative Continuous Media eplication Tecniques in Wireless Peer-to-Peer Networks Saram Gandearizade and Tooraj Helmi Department of Computer Science University of Soutern California
More informationComputing geodesic paths on manifolds
Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National
More informationNumerical Derivatives
Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten
More informationUUV DEPTH MEASUREMENT USING CAMERA IMAGES
ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University
More informationMean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks
Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department
More informationSection 1.2 The Slope of a Tangent
Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt
More informationDraXRouter: Global Routing in X-Architecture with Dynamic Resource Assignment*
DraXRouter: Global Routing in X-Arcitecture wit Dynamic Resource Assignment* Zen Cao 1, Tong Jing 1, Yu Hu 2, Yiyu Si 2, Xianlong Hong 1, Xiaodong Hu 3, Guiying Yan 3 1 Computer Science & Tecnology Department
More informationCapacity on Demand User s Guide
System z Capacity on Demand User s Guide SC28-6846-02 Level 02c, October 2009 System z Capacity on Demand User s Guide SC28-6846-02 Level 02c, October 2009 Note Before using tis information and te product
More informationOur Calibrated Model has No Predictive Value: An Example from the Petroleum Industry
Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial
More informationMinimizing Memory Access By Improving Register Usage Through High-level Transformations
Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg
More informationExtended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE
1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg
More informationProtecting Storage Location Privacy in Sensor Networks
Protecting Storage Location Privacy in Sensor Networks Jianming Zou, Wenseng Zang, and Daji Qiao Iowa State University Ames, IA 511 Email: {jmzou,wzang,daji}@iastate.edu ASTAT Numerous scemes ave been
More informationPacket Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the
Fluid Flow Loading Analysis of Packet Switcing Networks Jonatan S. Turner Computer and Communications Researc Center Wasington University, St. Louis, MO 63130 Abstract Recent researc in switcing as concentrated
More informationTest Generation for Acyclic Sequential Circuits with Hold Registers
Test Generation for Acyclic Sequential Circuits wit Hold Registers Tomoo Inoue, Debes Kumar Das, Ciio Sano, Takairo Miara, and Hideo Fujiwara Faculty of Information Sciences Computer Science and Engineering
More informationHASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS
HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece
More informationCubic smoothing spline
Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable
More informationForward End-To-End delay Analysis for AFDX networks
Forward End-To-End delay Analysis for AFDX networks Nassima Benammar, Frederic Ridouard, Henri Bauer and Pascal Ricard e-mail: {nassima.benammar,frederic.ridouard, pascal.ricard}@univ-poitiers.fr enri.bauer@ensma.fr
More informationUnsupervised Learning for Hierarchical Clustering Using Statistical Information
Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama
More informationSparsity Conditional Energy Label Distribution Learning for Age Estimation
Proceedings of te Twenty-Fift International Joint Conference on Artificial Intelligence (IJCAI-16) Sparsity Conditional Energy Label Distribution Learning for Age Estimation Xu Yang, Xin Geng, Deyu Zou
More informationPYRAMID FILTERS BASED ON BILINEAR INTERPOLATION
PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive
More informationMULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS
ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.
More informationCE 221 Data Structures and Algorithms
CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance
More informationTuning MAX MIN Ant System with off-line and on-line methods
Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas
More informationScheduling Non-Preemptible Jobs to Minimize Peak Demand. Received: 22 September 2017; Accepted: 25 October 2017; Published: 28 October 2017
algoritms Article Sceduling Non-Preemptible Jobs to Minimize Peak Demand Sean Yaw 1 ID and Brendan Mumey 2, * ID 1 Los Alamos National Laboratoy, Los Alamos, NM 87545, USA; yaw@lanl.gov 2 Gianforte Scool
More informationPLK-B SERIES Technical Manual (USA Version) CLICK HERE FOR CONTENTS
PLK-B SERIES Technical Manual (USA Version) CLICK ERE FOR CONTENTS CONTROL BOX PANEL MOST COMMONLY USED FUNCTIONS INITIAL READING OF SYSTEM SOFTWARE/PAGES 1-2 RE-INSTALLATION OF TE SYSTEM SOFTWARE/PAGES
More informationMeasuring Length 11and Area
Measuring Lengt 11and Area 11.1 Areas of Triangles and Parallelograms 11.2 Areas of Trapezoids, Romuses, and Kites 11.3 Perimeter and Area of Similar Figures 11.4 Circumference and Arc Lengt 11.5 Areas
More informationAbstract Application and System Model /DATE EDAA
Analysis and Optimization of Fault-Tolerant Embedded Systems wit Hardened Processors Viaceslav Izosimov, Ilia Polian, Paul Pop, Petru Eles, Zebo Peng {viaiz petel zebpe}@ida.liu.se Dept. of Computer and
More informationRedundancy Awareness in SQL Queries
Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL
More information12.2 TECHNIQUES FOR EVALUATING LIMITS
Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of
More informationProceedings. Seventh ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC 2013) Palm Spring, CA
Proceedings Of te Sevent ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC ) Palm Spring, CA October 9 November st Parameter-Unaware Autocalibration for Occupancy Mapping David Van
More informationSORTING 9/26/18. Prelim 1. Prelim 1. Why Sorting? InsertionSort. Some Sorting Algorithms. Tonight!!!! Two Sessions:
Prelim 1 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Tonigt!!!! Two Sessions: You sould now y now wat room to tae te final. Jenna
More informationAlternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method
Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X
More informationCoarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes
Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University
More informationEfficient Content-Based Indexing of Large Image Databases
Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various
More informationMAPI Computer Vision
MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -
More informationDesign of PSO-based Fuzzy Classification Systems
Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,
More informationA Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets
A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty
More informationAn Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques
An Eicient Fault-Tolerant Multicast outing Protocol wit Core-Based Tree Tecniques Weijia Jia + Wei Zao * + Department o Computer Science City University o Hong Kong Kowloon, Hong Kong Email: {wjia, gxu}@cs.cityu.edu.k
More informationSensor Data Collection with Expected Reliability Guarantees
Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini
More informationAn Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks
Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical
More informationNOTES: A quick overview of 2-D geometry
NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.
More informationInterference and Diffraction of Light
Interference and Diffraction of Ligt References: [1] A.P. Frenc: Vibrations and Waves, Norton Publ. 1971, Capter 8, p. 280-297 [2] PASCO Interference and Diffraction EX-9918 guide (written by Ann Hanks)
More informationEnergy efficient temporal load aware resource allocation in cloud computing datacenters
Vakilinia Journal of Cloud Computing: Advances, Systems and Applications (2018) 7:2 DOI 10.1186/s13677-017-0103-2 Journal of Cloud Computing: Advances, Systems and Applications RESEARCH Energy efficient
More informationImage Registration via Particle Movement
Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced
More informationApplication of a Key Value Paradigm to Logic Factoring
INVITED PAPER Application of a Key Value Paradigm to Logic Factoring Te autor first revisits a classic algoritm for algebraic factoring to establis a stronger connection to te functional intent rater tan
More informationComparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method
International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined
More informationAn Interactive X-Ray Image Segmentation Technique for Bone Extraction
An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro
More informationChapter K. Geometric Optics. Blinn College - Physics Terry Honan
Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental
More information15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes
15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written
More informationDesign of Map Decomposition and Wiimote-based Localization for Vacuuming Robots
Design of Map Decomposition and Wiimote-based Localization for Vacuuming Robots Cia-Pin Kuo, Sy-In Hwang Department of Computer Science and Engineering Yuan Ze University s956007@mail.yzu.edu.tw, syin@cs.yzu.edu.tw
More information